Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    16/07/2024, 00:21

General

  • Target

    4c0a7ca04aac0a5abb6a0ae0d59d7a0d_JaffaCakes118.exe

  • Size

    250KB

  • MD5

    4c0a7ca04aac0a5abb6a0ae0d59d7a0d

  • SHA1

    1bb69e84abfd74269e9785f5b679c30467532a14

  • SHA256

    72d779a0485360b5a636bc014d5ccf88ff4745453382ac675b968d5301f9b418

  • SHA512

    aa5cc1743d5443609c8b749d45066ca06193164d87bd4672eee720d097d99716d9acff4854f413dfe32c6fe7a681da25d131c546f9186592f7b327e45ded835e

  • SSDEEP

    6144:j7y+Qfb56BBMl5yyw5CpA/7sJ5pwvP6bQ7yMP+DE827KJF:/yf6aw5krJ5i6b7MP+Dd2A

Score
6/10

Malware Config

Signatures

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in Windows directory 2 IoCs
  • Modifies registry class 3 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4c0a7ca04aac0a5abb6a0ae0d59d7a0d_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\4c0a7ca04aac0a5abb6a0ae0d59d7a0d_JaffaCakes118.exe"
    1⤵
    • Writes to the Master Boot Record (MBR)
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2724
    • C:\Windows\SysWOW64\explorer.exe
      explorer.exe "c:\FINAL_TBF2.pdf"
      2⤵
        PID:2676
    • C:\Windows\explorer.exe
      C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:2796
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\FINAL_TBF2.pdf"
        2⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2636

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

      Filesize

      3KB

      MD5

      af90ea9b6cc31dc0197dfad2e8a0f50e

      SHA1

      6d376c348b04f495d73b7c42fc231fb60496a45c

      SHA256

      33b0bf89d0da93c8387097290033b791b12f7f318b81bd521caa1c893c70bb62

      SHA512

      1151fdacfdb0388ba9d68f75cb5beab25b367fe32e14334283c1fb3a82f14f24b8358fc83c76e29785b171ab4bcf1d358b9d3476b86097afe4d61c8647d22f47

    • memory/2724-0-0x0000000000400000-0x0000000000479000-memory.dmp

      Filesize

      484KB

    • memory/2724-3-0x0000000000400000-0x0000000000479000-memory.dmp

      Filesize

      484KB

    • memory/2724-2-0x0000000000459000-0x000000000045A000-memory.dmp

      Filesize

      4KB

    • memory/2724-1-0x00000000008E0000-0x0000000000959000-memory.dmp

      Filesize

      484KB

    • memory/2724-4-0x0000000000400000-0x0000000000479000-memory.dmp

      Filesize

      484KB

    • memory/2724-7-0x0000000000400000-0x0000000000479000-memory.dmp

      Filesize

      484KB